In Progress MOVEit Transfer versions released before 2022.0.11 (14.0.11), 2022.1.12 (14.1.12), 2023.0.9 (15.0.9), 2023.1.4 (15.1.4), a logging bypass vulnerability has been discovered. An authenticated user could manipulate a request to bypass the logging mechanism within the web application which results in user activity not being logged properly.
References
Link | Resource |
---|---|
https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-March-2024 | Vendor Advisory |
https://www.progress.com/moveit | Product |
https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-March-2024 | Vendor Advisory |
https://www.progress.com/moveit | Product |
Configurations
Configuration 1 (hide)
|
History
16 Jan 2025, 18:02
Type | Values Removed | Values Added |
---|---|---|
First Time |
Progress moveit Transfer
Progress |
|
CPE | cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:* | |
CWE | NVD-CWE-Other | |
References | () https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-March-2024 - Vendor Advisory | |
References | () https://www.progress.com/moveit - Product |
Information
Published : 2024-03-20 15:15
Updated : 2025-01-16 18:02
NVD link : CVE-2024-2291
Mitre link : CVE-2024-2291
CVE.ORG link : CVE-2024-2291
JSON object : View
Products Affected
progress
- moveit_transfer
CWE